Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated cyberattacks. Despite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a CIDS to work effectively. The blockchain technology with built-in immutability and consensus building capability provides a viable solution to the issues of CIDS. In this paper, we introduce an architecture for a blockchain-enabled signature-based collaborative IDS, discuss the implementation strategy of the proposed architecture and developed a prototype using Hyperledger and Snort. Our prel...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
The ability of blockchain technology to improve security and transparency across a range of industri...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
In an attempt to cope with the increased number of cyberattacks, research in Intrusion Detection Sys...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
The ability of blockchain technology to improve security and transparency across a range of industri...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share reso...
As the threat of cyber attack grows ever larger, new approaches to security are required. While the...
In an attempt to cope with the increased number of cyberattacks, research in Intrusion Detection Sys...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
One effective way of detecting malicious traffic in computer networks is intrusion detection systems...
As the threat of cyber attack grows ever larger, new approaches to security are required. While ther...
Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against ...
Collaborative intrusion detection approach uses the shared detection signature between the collabora...
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability...
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (I...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector ...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
The ability of blockchain technology to improve security and transparency across a range of industri...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...